Shellcode loader based on indirect syscall
☆22Feb 9, 2025Updated last year
Alternatives and similar repositories for AxiomLoader
Users that are interested in AxiomLoader are comparing it to the libraries listed below
Sorting:
- Derrick is an advanced data leak scanning and CVE vulnerability analysis tool, designed for cybersecurity researchers and digital defense…☆32Mar 6, 2025Updated last year
- Interactive simulation of a fictional ransomware group's dashboard☆12Sep 30, 2024Updated last year
- Active Directory Mindmap Recipes: A Compromise à la Carte☆151Sep 4, 2025Updated 6 months ago
- ☆44Jan 22, 2026Updated 2 months ago
- SwitchToOpen - The open source shift☆305Nov 21, 2025Updated 4 months ago
- Small cyber challenges for fun and no profit☆12May 20, 2025Updated 10 months ago
- blog☆24Mar 9, 2026Updated last week
- havoc2nginx is a simple python script that converts Havoc Framework's yaotl malleable c2 profile to Nginx configuration file format. Most…☆12May 8, 2023Updated 2 years ago
- Bruteforce DPAPI encrypted MasterKey File from Windows Credentials Manager☆23Jan 4, 2025Updated last year
- Rehashing APIs to prevent hash based detection☆14Jan 7, 2025Updated last year
- A solution to create obfuscated shellcode from msfvenom for PowerShell.☆26Aug 3, 2022Updated 3 years ago
- WinDbg plugin to trace module transitions from a debugged driver.☆47Dec 22, 2025Updated 3 months ago
- Eset-Unload is a C++ tool that interacts with a process's loaded modules to identify and unload the ebehmoni.dll module, typically found …☆12Apr 21, 2025Updated 11 months ago
- System Call Integrity Layer - experimental security research☆25Jan 31, 2026Updated last month
- A collection of practical implementation of security recommendations☆13Sep 24, 2024Updated last year
- ☆65Dec 19, 2024Updated last year
- A collection of Script for Red Team & Incidence Response☆11Jun 30, 2022Updated 3 years ago
- REcon 2024 Repo, slides for talk "GOP Complex: Image parsing bugs, EBC polymorphic engines and the Deus ex machina of UEFI exploit dev""☆14Mar 31, 2025Updated 11 months ago
- A collection of sample code used in some experiments with Sliver C2☆16Mar 28, 2023Updated 2 years ago
- A repository holding Proof of Concepts for executing the calculator application via different file formats☆42Jun 27, 2024Updated last year
- just a basic rootkit for learning how to playing sys_call_table☆16Sep 12, 2016Updated 9 years ago
- Evasion kit for Cobalt Strike☆30Jan 16, 2026Updated 2 months ago
- Advanced PoC & Research for CVE-2026-0828 (Safetica) and CVE-2025-7771 (ThrottleStop). Analysis of BYOVD (Bring Your Own Vulnerable Drive…☆28Feb 4, 2026Updated last month
- Base64 Mutator☆13Feb 13, 2021Updated 5 years ago
- Challenges du 404 CTF☆25Feb 16, 2023Updated 3 years ago
- Sh3ller is a lightweight C2 framework in its simplest form.☆31Sep 5, 2025Updated 6 months ago
- A simple POC to expose Mythic as a MCP server☆73Mar 20, 2025Updated last year
- Resolve offsets, gadgets and symbols from NTKernel☆56Jan 15, 2026Updated 2 months ago
- Backport of SliverStager to work with DotNetToJScript for vba☆17Aug 9, 2024Updated last year
- 7 days of Red Teaming TTPs that your favorite tools may use to acheive a post exploitation goal☆18Apr 17, 2021Updated 4 years ago
- Identify the accounts most vulnerable to dictionary attacks☆121Apr 2, 2025Updated 11 months ago
- The Hacker's Choice☆16Mar 15, 2026Updated last week
- DeadManSwitch in rust with several triggers (remote local and network)☆17Nov 19, 2025Updated 4 months ago
- Shadow Rebirth - An Aggressive Outbreak Anti-Debugging Technique☆20Dec 3, 2024Updated last year
- Sliver agents for Mythic☆48Nov 18, 2024Updated last year
- Automated Pass-the-Ticket (PtT) attack. Standalone alternative to Rubeus and Mimikatz for this attack. Implemented in C#, C++, Crystal, P…☆128Feb 17, 2026Updated last month
- Lsass dumper evading (all ?) EDR detection☆49Nov 10, 2025Updated 4 months ago
- ☆16May 15, 2021Updated 4 years ago
- A collection of boilerplate code and projects for testing ideas☆14Jan 14, 2026Updated 2 months ago